Research Article

A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain

Figure 7

(a, b) Retrieved images of tree, baboon for wrong two LCT orders; (c, d) decrypted images using another two-wrong parameter; (e, f) wrong values of DPM and RPM.
(a)
(b)
(c)
(d)
(e)
(f)